Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             25 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adjusted probabilistic route discovery in mobile ad hoc networks Abdulai, Jamal-Deen
2009
35 1 p. 168-182
15 p.
artikel
2 An area/performance trade-off analysis of a GF(2 m ) multiplier architecture for elliptic curve cryptography Morales-Sandoval, Miguel
2009
35 1 p. 54-58
5 p.
artikel
3 An efficient cryptosystem Delta for stream cipher applications Kanso, Ali A.
2009
35 1 p. 126-140
15 p.
artikel
4 A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification Kang, Baoyuan
2009
35 1 p. 9-17
9 p.
artikel
5 A secure identity-based multi-proxy signature scheme Cao, Feng
2009
35 1 p. 86-95
10 p.
artikel
6 A self-verification authentication mechanism for mobile satellite communication systems Chen, Tzung-Her
2009
35 1 p. 41-48
8 p.
artikel
7 A versatile Montgomery multiplier architecture with characteristic three support Öztürk, E.
2009
35 1 p. 71-85
15 p.
artikel
8 Dynamic and efficient joint encryption scheme in the plain public key model Shao, Zuhua
2009
35 1 p. 189-196
8 p.
artikel
9 Dynamic queue level control of TCP/RED systems in AQM routers Zhang, Wei
2009
35 1 p. 59-70
12 p.
artikel
10 Editorial Board 2009
35 1 p. IFC-
1 p.
artikel
11 Enhanced AODV routing protocol for Bluetooth scatternet Al-Jarrah, Omar
2009
35 1 p. 197-208
12 p.
artikel
12 Enhanced password-based simple three-party key exchange protocol Kim, Hyun-Seok
2009
35 1 p. 107-114
8 p.
artikel
13 Fast edge integration based active contours for color images Zheng, Ying
2009
35 1 p. 141-149
9 p.
artikel
14 Further performance analysis of the generalized MC DS-CDMA system in Nakagami-m fading channels Sener, Seher
2009
35 1 p. 1-8
8 p.
artikel
15 Identity-based strong designated verifier signature schemes: Attacks and new construction Kang, Baoyuan
2009
35 1 p. 49-53
5 p.
artikel
16 2008 List of Referees 2009
35 1 p. 227-230
4 p.
artikel
17 More efficient systolic arrays for multiplication in GF( 2 m ) using LSB first algorithm with irreducible polynomials and trinomials Kwon, Soonhak
2009
35 1 p. 159-167
9 p.
artikel
18 Multichannel direct sequence spectrum signaling using code phase shift keying Sahu, P.P.
2009
35 1 p. 218-226
9 p.
artikel
19 Multiple partner coded cooperation scheme for wireless communications and its performance analysis for two cooperative users Jamshidi, Azizollah
2009
35 1 p. 96-106
11 p.
artikel
20 New left-to-right minimal weight signed-digit radix-r representation Qin, Baodong
2009
35 1 p. 150-158
9 p.
artikel
21 Performance of commercial multimedia workloads on the Intel Pentium 4: A case study Martinez, Christopher
2009
35 1 p. 18-32
15 p.
artikel
22 Robust watermarking based on DWT and nonnegative matrix factorization Lu, Wei
2009
35 1 p. 183-188
6 p.
artikel
23 Secure seamless peer-to-peer (P2P) UDP communication using IPv4 LSRR option and IPv4+4 addresses Topal, Cihan
2009
35 1 p. 115-125
11 p.
artikel
24 Two efficient two-factor authenticated key exchange protocols in public wireless LANs Juang, Wen-Shenq
2009
35 1 p. 33-40
8 p.
artikel
25 Undecimated double density wavelet transform based speckle reduction in SAR images Gnanadurai, D.
2009
35 1 p. 209-217
9 p.
artikel
                             25 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland